T0263
|
Identify security requirements specific to an information technology (IT) system in all phases of the system life cycle. |
2 |
T0558
|
Analyze user needs and requirements to plan and conduct system development. |
1 |
T0559
|
Develop designs to meet specific operational needs and environmental factors (e.g., access controls, automated applications, networked operations. |
1 |
T0560
|
Collaborate on cybersecurity designs to meet specific operational needs and environmental factors (e.g., access controls, automated applications, networked operations, high integrity and availability requirements, multilevel security/processing of multiple classification levels, and processing Sensitive Compartmented Information). |
1 |
T0561
|
Accurately characterize targets. |
1 |
T0562
|
Adjust collection operations or collection plan to address identified issues/challenges and to synchronize collections with overall operational requirements. |
1 |
T0563
|
Provide input to the analysis, design, development or acquisition of capabilities used for meeting objectives. |
2 |
T0564
|
Analyze feedback to determine extent to which collection products and services are meeting requirements. |
2 |
T0565
|
Analyze incoming collection requests. |
1 |
T0566
|
Analyze internal operational architecture, tools, and procedures for ways to improve performance. |
1 |
T0567
|
Analyze target operational architecture for ways to gain access. |
1 |
T0568
|
Analyze plans, directives, guidance and policy for factors that would influence collection management's operational structure and requirement s (e.g., duration, scope, communication requirements, interagency/international agreements). |
2 |
T0569
|
Answer requests for information. |
2 |
T0570
|
Apply and utilize authorized cyber capabilities to enable access to targeted networks. |
1 |
T0571
|
Apply expertise in policy and processes to facilitate the development, negotiation, and internal staffing of plans and/or memorandums of agreement. |
2 |
T0572
|
Apply cyber collection, environment preparation and engagement expertise to enable new exploitation and/or continued collection operations, or in support of customer requirements. |
1 |
T0573
|
Assess and apply operational environment factors and risks to collection management process. |
1 |
T0574
|
Apply and obey applicable statutes, laws, regulations and policies. |
1 |
T0575
|
Coordinate for intelligence support to operational planning activities. |
1 |
T0576
|
Assess all-source intelligence and recommend targets to support cyber operation objectives. |
1 |
T0577
|
Assess efficiency of existing information exchange and management systems. |
1 |
T0578
|
Assess performance of collection assets against prescribed specifications. |
2 |
T0579
|
Assess target vulnerabilities and/or operational capabilities to determine course of action. |
2 |
T0580
|
Assess the effectiveness of collections in satisfying priority information gaps, using available capabilities and methods, and adjust collection strategies and collection requirements accordingly. |
1 |
T0581
|
Assist and advise interagency partners in identifying and developing best practices for facilitating operational support to achievement of organization objectives. |
3 |
T0582
|
Provide expertise to course of action development. |
5 |
T0583
|
Provide subject matter expertise to the development of a common operational picture. |
3 |
T0584
|
Maintain a common intelligence picture. |
2 |
T0585
|
Provide subject matter expertise to the development of cyber operations specific indicators. |
3 |
T0586
|
Assist in the coordination, validation, and management of all-source collection requirements, plans, and/or activities. |
3 |
T0587
|
Assist in the development and refinement of priority information requirements. |
1 |
T0588
|
Provide expertise to the development of measures of effectiveness and measures of performance. |
2 |
T0589
|
Assist in the identification of intelligence collection shortfalls. |
3 |
T0590
|
Enable synchronization of intelligence support plans across partner organizations as required. |
1 |
T0591
|
Perform analysis for target infrastructure exploitation activities. |
1 |
T0592
|
Provide input to the identification of cyber-related success criteria. |
2 |
T0593
|
Brief threat and/or target current situations. |
3 |
T0594
|
Build and maintain electronic target folders. |
1 |
T0595
|
Classify documents in accordance with classification guidelines. |
1 |
T0596
|
Close requests for information once satisfied. |
1 |
T0597
|
Collaborate with intelligence analysts/targeting organizations involved in related areas. |
4 |
T0598
|
Collaborate with development organizations to create and deploy the tools needed to achieve objectives. |
1 |
T0599
|
Collaborate with other customer, Intelligence and targeting organizations involved in related cyber areas. |
2 |
T0600
|
Collaborate with other internal and external partner organizations on target access and operational issues. |
1 |
T0601
|
Collaborate with other team members or partner organizations to develop a diverse program of information materials (e.g., web pages, briefings, print materials). |
2 |
T0602
|
Collaborate with customer to define information requirements. |
1 |
T0603
|
Communicate new developments, breakthroughs, challenges and lessons learned to leadership, and internal and external customers. |
1 |
T0604
|
Compare allocated and available assets to collection demand as expressed through requirements. |
1 |
T0605
|
Compile lessons learned from collection management activity's execution of organization collection objectives. |
2 |
T0662
|
Allocate collection assets based on leadership's guidance, priorities, and/or operational emphasis. |
1 |
T0264
|
Ensure that plans of actions and milestones or remediation plans are in place for vulnerabilities identified during risk assessments, audits, inspections, etc. |
3 |
T0265
|
Assure successful implementation and functionality of security requirements and appropriate information technology (IT) policies and procedures that are consistent with the organization's mission and goals. |
2 |
T0266
|
Perform penetration testing as required for new or updated applications. |
2 |
T0267
|
Design countermeasures and mitigations against potential exploitations of programming language weaknesses and vulnerabilities in system and elements. |
1 |
T0268
|
Define and document how the implementation of a new system or new interfaces between systems impacts the security posture of the current environment. |
2 |
T0269
|
Design and develop key management functions (as related to cybersecurity). |
1 |
T0270
|
Analyze user needs and requirements to plan and conduct system security development. |
1 |
T0271
|
Develop cybersecurity designs to meet specific operational needs and environmental factors (e.g., access controls, automated applications, networked operations, high integrity and availability requirements, multilevel security/processing of multiple classification levels, and processing Sensitive Compartmented Information). |
1 |
T0272
|
Ensure that security design and cybersecurity development activities are properly documented (providing a functional description of security implementation) and updated as necessary. |
2 |
T0273
|
Develop and document supply chain risks for critical system elements, as appropriate. |
4 |
T0274
|
Create auditable evidence of security measures. |
1 |
T0275
|
Support necessary compliance activities (e.g., ensure that system security configuration guidelines are followed, compliance monitoring occurs). |
2 |
T0276
|
Participate in the acquisition process as necessary, following appropriate supply chain risk management practices. |
1 |
T0277
|
Ensure that all acquisitions, procurements, and outsourcing efforts address information security requirements consistent with organization goals. |
6 |
T0278
|
Collect intrusion artifacts (e.g., source code, malware, Trojans) and use discovered data to enable mitigation of potential cyber defense incidents within the enterprise. |
1 |
T0279
|
Serve as technical expert and liaison to law enforcement personnel and explain incident details as required. |
2 |
T0280
|
Continuously validate the organization against policies/guidelines/procedures/regulations/laws to ensure compliance. |
1 |
T0281
|
Forecast ongoing service demands and ensure that security assumptions are reviewed as necessary. |
1 |
T0282
|
Define and/or implement policies and procedures to ensure protection of critical infrastructure as appropriate. |
2 |
T0283
|
Collaborate with stakeholders to identify and/or develop appropriate solutions technology. |
1 |
T0284
|
Design and develop new tools/technologies as related to cybersecurity. |
1 |
T0285
|
Perform virus scanning on digital media. |
1 |
T0286
|
Perform file system forensic analysis. |
1 |
T0287
|
Perform static analysis to mount an "image" of a drive (without necessarily having the original drive). |
1 |
T0288
|
Perform static malware analysis. |
1 |
T0289
|
Utilize deployable forensics toolkit to support operations as necessary. |
1 |
T0290
|
Determine tactics, techniques, and procedures (TTPs) for intrusion sets. |
1 |
T0291
|
Examine network topologies to understand data flows through the network. |
1 |
T0292
|
Recommend computing environment vulnerability corrections. |
1 |
T0293
|
Identify and analyze anomalies in network traffic using metadata. |
1 |
T0294
|
Conduct research, analysis, and correlation across a wide variety of all source data sets (indications and warnings). |
1 |
T0295
|
Validate intrusion detection system (IDS) alerts against network traffic using packet analysis tools. |
1 |
T0296
|
Isolate and remove malware. |
1 |
T0297
|
Identify applications and operating systems of a network device based on network traffic. |
1 |
T0298
|
Reconstruct a malicious attack or activity based off network traffic. |
1 |
T0299
|
Identify network mapping and operating system (OS) fingerprinting activities. |
1 |
T0300
|
Develop and document User Experience (UX) requirements including information architecture and user interface requirements. |
1 |
T0301
|
Develop and implement cybersecurity independent audit processes for application software/networks/systems and oversee ongoing independent audits to ensure that operational and Research and Design (R&D) processes and procedures are in compliance with organizational and mandatory cybersecurity requirements and accurately followed by Systems Administrators and other cybersecurity staff when performing their day-to-day activities. |
0 |
T0302
|
Develop contract language to ensure supply chain, system, network, and operational security are met. |
3 |
T0303
|
Identify and leverage the enterprise-wide version control system while designing and developing secure applications. |
1 |
T0304
|
Implement and integrate system development life cycle (SDLC) methodologies (e.g., IBM Rational Unified Process) into development environment. |
2 |
T0305
|
Performs configuration management, problem management, capacity management, and financial management for databases and data management systems. |
1 |
T0306
|
Supports incident management, service-level management, change management, release management, continuity management, and availability management for databases and data management systems. |
1 |
T0307
|
Analyze candidate architectures, allocate security services, and select security mechanisms. |
2 |
T0308
|
Analyze incident data for emerging trends. |
2 |
T0309
|
Assess the effectiveness of security controls. |
2 |
T0310
|
Assist in the construction of signatures which can be implemented on cyber defense network tools in response to new or observed threats within the network environment or enclave. |
1 |
T0311
|
Consult with customers about software system design and maintenance. |
2 |
T0312
|
Coordinate with intelligence analysts to correlate threat assessment data. |
2 |
T0313
|
Design and document quality standards. |
1 |
T0314
|
Develop a system security context, a preliminary system security Concept of Operations (CONOPS), and define baseline system security requirements in accordance with applicable cybersecurity requirements. |
2 |
T0315
|
Develop and deliver technical training to educate others or meet customer needs. |
1 |
T0316
|
Develop or assist in the development of computer based training modules or classes. |
1 |
T0317
|
Develop or assist in the development of course assignments. |
1 |
T0318
|
Develop or assist in the development of course evaluations. |
1 |
T0319
|
Develop or assist in the development of grading and proficiency standards. |
1 |
T0320
|
Assist in the development of individual/collective development, training, and/or remediation plans. |
1 |
T0321
|
Develop or assist in the development of learning objectives and goals. |
1 |
T0322
|
Develop or assist in the development of on-the-job training materials or programs. |
1 |
T0323
|
Develop or assist in the development of written tests for measuring and assessing learner proficiency. |
1 |
T0324
|
Direct software programming and development of documentation. |
2 |
T0325
|
Document a system's purpose and preliminary system security concept of operations. |
1 |
T0326
|
Employ configuration management processes. |
2 |
T0327
|
Evaluate network infrastructure vulnerabilities to enhance capabilities being developed. |
1 |
T0328
|
Evaluate security architectures and designs to determine the adequacy of security design and architecture proposed or provided in response to requirements contained in acquisition documents. |
2 |
T0329
|
Follow software and systems engineering life cycle standards and processes. |
1 |
T0330
|
Maintain assured message delivery systems. |
1 |
T0331
|
Maintain incident tracking and solution database. |
1 |
T0332
|
Notify designated managers, cyber incident responders, and cybersecurity service provider team members of suspected cyber incidents and articulate the event's history, status, and potential impact for further action in accordance with the organization's cyber incident response plan. |
1 |
T0333
|
Perform cyber defense trend analysis and reporting. |
0 |
T0334
|
Ensure that all systems components can be integrated and aligned (e.g., procedures, databases, policies, software, and hardware). |
1 |
T0335
|
Build, install, configure, and test dedicated cyber defense hardware. |
1 |
T0336
|
WITHDRAWN: Integrated with T0228 |
0 |
T0337
|
Supervise and assign work to programmers, designers, technologists and technicians, and other engineering and scientific personnel. |
3 |
T0338
|
Write detailed functional specifications that document the architecture development process. |
2 |
T0339
|
Lead efforts to promote the organization's use of knowledge management and information sharing. |
1 |
T0340
|
Act as a primary stakeholder in the underlying information technology (IT) operational processes and functions that support the service, provide direction and monitor all significant activities so the service is delivered successfully. |
3 |
T0341
|
Advocate for adequate funding for cyber training resources, to include both internal and industry-provided courses, instructors, and related materials. |
2 |
T0342
|
Analyze data sources to provide actionable recommendations. |
1 |
T0343
|
Analyze the crisis to ensure public, personal, and resource protection. |
1 |
T0344
|
Assess all the configuration management (change configuration/release management) processes. |
2 |
T0345
|
Assess effectiveness and efficiency of instruction according to ease of instructional technology use and student learning, knowledge transfer, and satisfaction. |
1 |
T0346
|
Assess the behavior of the individual victim, witness, or suspect as it relates to the investigation. |
1 |
T0347
|
Assess the validity of source data and subsequent findings. |
1 |
T0348
|
Assist in assessing the impact of implementing and sustaining a dedicated cyber defense infrastructure. |
1 |
T0349
|
Collect metrics and trending data. |
1 |
T0350
|
Conduct a market analysis to identify, assess, and recommend commercial, Government off-the-shelf, and open source products for use within a system and ensure recommended products are in compliance with organization's evaluation and validation requirements. |
1 |
T0351
|
Conduct hypothesis testing using statistical processes. |
1 |
T0352
|
Conduct learning needs assessments and identify requirements. |
3 |
T0353
|
Confer with systems analysts, engineers, programmers, and others to design application. |
1 |
T0354
|
Coordinate and manage the overall service provided to a customer end-to-end. |
3 |
T0355
|
Coordinate with internal and external subject matter experts to ensure existing qualification standards reflect organizational functional requirements and meet industry standards. |
1 |
T0356
|
Coordinate with organizational manpower stakeholders to ensure appropriate allocation and distribution of human capital assets. |
2 |
T0357
|
Create interactive learning exercises to create an effective learning environment. |
1 |
T0358
|
Design and develop system administration and management functionality for privileged access users. |
1 |
T0129
|
Integrate new systems into existing network architecture. |
1 |
T0359
|
Design, implement, test, and evaluate secure interfaces between information systems, physical systems, and/or embedded technologies. |
2 |
T0360
|
Determine the extent of threats and recommend courses of action or countermeasures to mitigate risks. |
1 |
T0361
|
Develop and facilitate data-gathering methods. |
1 |
T0362
|
Develop and implement standardized position descriptions based on established cyber work roles. |
1 |
T0363
|
Develop and review recruiting, hiring, and retention procedures in accordance with current HR policies. |
1 |
T0364
|
Develop cyber career field classification structure to include establishing career field entry requirements and other nomenclature such as codes and identifiers. |
1 |
T0365
|
Develop or assist in the development of training policies and protocols for cyber training. |
3 |
T0366
|
Develop strategic insights from large data sets. |
1 |
T0367
|
Develop the goals and objectives for cyber curriculum. |
2 |
T0368
|
Ensure that cyber career fields are managed in accordance with organizational HR policies and directives. |
1 |
T0369
|
Ensure that cyber workforce management policies and processes comply with legal and organizational requirements regarding equal opportunity, diversity, and fair hiring/employment practices. |
2 |
T0370
|
Ensure that appropriate Service-Level Agreements (SLAs) and underpinning contracts have been defined that clearly set out for the customer a description of the service and the measures for monitoring the service. |
2 |
T0371
|
Establish acceptable limits for the software application, network, or system. |
2 |
T0372
|
Establish and collect metrics to monitor and validate cyber workforce readiness including analysis of cyber workforce data to assess the status of positions identified, filled, and filled with qualified personnel. |
1 |
T0373
|
Establish and oversee waiver processes for cyber career field entry and training qualification requirements. |
1 |
T0374
|
Establish cyber career paths to allow career progression, deliberate development, and growth within and between cyber career fields. |
1 |
T0375
|
Establish manpower, personnel, and qualification data element standards to support cyber workforce management and reporting requirements. |
1 |
T0376
|
Establish, resource, implement, and assess cyber workforce management programs in accordance with organizational requirements. |
1 |
T0377
|
Gather feedback on customer satisfaction and internal service performance to foster continual improvement. |
4 |
T0378
|
Incorporates risk-driven systems maintenance updates process to address system deficiencies (periodically and out of cycle). |
1 |
T0379
|
Manage the internal relationship with information technology (IT) process owners supporting the service, assisting with the definition and agreement of Operating Level Agreements (OLAs). |
2 |
T0380
|
Plan instructional strategies such as lectures, demonstrations, interactive exercises, multimedia presentations, video courses, web-based courses for most effective learning environment in conjunction with educators and trainers. |
1 |
T0381
|
Present technical information to technical and nontechnical audiences. |
3 |
T0382
|
Present data in creative formats. |
2 |
T0383
|
Program custom algorithms. |
1 |
T0384
|
Promote awareness of cyber policy and strategy as appropriate among management and ensure sound principles are reflected in the organization's mission, vision, and goals. |
3 |
T0385
|
Provide actionable recommendations to critical stakeholders based on data analysis and findings. |
1 |
T0386
|
Provide criminal investigative support to trial counsel during the judicial process. |
1 |
T0387
|
Review and apply cyber career field qualification standards. |
1 |
T0388
|
Review and apply organizational policies related to or influencing the cyber workforce. |
1 |
T0389
|
Review service performance reports identifying any significant issues and variances, initiating, where necessary, corrective actions and ensuring that all outstanding issues are followed up. |
3 |
T0390
|
Review/Assess cyber workforce effectiveness to adjust skill and/or qualification standards. |
2 |
T0391
|
Support integration of qualified cyber workforce personnel into information systems life cycle development processes. |
1 |
T0392
|
Utilize technical documentation or resources to implement a new mathematical, data science, or computer science method. |
1 |
T0393
|
Validate specifications and requirements for testability. |
1 |
T0394
|
Work with other service managers and product owners to balance and prioritize services to meet overall customer requirements, constraints, and objectives. |
2 |
T0395
|
Write and publish after action reviews. |
2 |
T0396
|
Process image with appropriate tools depending on analyst’s goals. |
1 |
T0397
|
Perform Windows registry analysis. |
1 |
T0398
|
Perform file and registry monitoring on the running system after identifying intrusion via dynamic analysis. |
2 |
T0399
|
Enter media information into tracking database (e.g., Product Tracker Tool) for digital media that has been acquired. |
1 |
T0400
|
Correlate incident data and perform cyber defense reporting. |
1 |
T0401
|
Maintain deployable cyber defense toolkit (e.g., specialized cyber defense software/hardware) to support Incident Response Team mission. |
2 |
T0402
|
Effectively allocate storage capacity in the design of data management systems. |
1 |
T0403
|
Read, interpret, write, modify, and execute simple scripts (e.g., Perl, VBScript) on Windows and UNIX systems (e.g., those that perform tasks such as: parsing large data files, automating manual tasks, and fetching/processing remote data). |
2 |
T0404
|
Utilize different programming languages to write code, open files, read files, and write output to different files. |
1 |
T0405
|
Utilize open source language such as R and apply quantitative techniques (e.g., descriptive and inferential statistics, sampling, experimental design, parametric and non-parametric tests of difference, ordinary least squares regression, general line). |
1 |
T0406
|
Ensure that design and development activities are properly documented (providing a functional description of implementation) and updated as necessary. |
1 |
T0407
|
Participate in the acquisition process as necessary. |
2 |
T0408
|
Interpret and apply applicable laws, statutes, and regulatory documents and integrate into policy. |
2 |
T0409
|
Troubleshoot prototype design and process issues throughout the product design, development, and pre-launch phases. |
1 |
T0410
|
Identify functional- and security-related features to find opportunities for new capability development to exploit or mitigate vulnerabilities. |
1 |
T0411
|
Identify and/or develop reverse engineering tools to enhance capabilities and detect vulnerabilities. |
2 |
T0412
|
Conduct import/export reviews for acquiring systems and software. |
4 |
T0413
|
Develop data management capabilities (e.g., cloud-based, centralized cryptographic key management) to include support to the mobile workforce. |
1 |
T0414
|
Develop supply chain, system, network, performance, and cybersecurity requirements. |
3 |
T0415
|
Ensure that supply chain, system, network, performance, and cybersecurity requirements are included in contract language and delivered. |
4 |
T0416
|
Enable applications with public keying by leveraging existing public key infrastructure (PKI) libraries and incorporating certificate management and encryption functionalities when appropriate. |
1 |
T0417
|
Identify and leverage the enterprise-wide security services while designing and developing secure applications (e.g., Enterprise PKI, Federated Identity server, Enterprise Antivirus solution) when appropriate. |
1 |
T0418
|
Install, update, and troubleshoot systems/servers. |
1 |
T0419
|
Acquire and maintain a working knowledge of constitutional issues which arise in relevant laws, regulations, policies, agreements, standards, procedures, or other issuances. |
2 |
T0420
|
Administer test bed(s), and test and evaluate applications, hardware infrastructure, rules/signatures, access controls, and configurations of platforms managed by service provider(s). |
1 |
T0421
|
Manage the indexing/cataloguing, storage, and access of explicit organizational knowledge (e.g., hard copy documents, digital files). |
1 |
T0422
|
Implement data management standards, requirements, and specifications. |
1 |
T0423
|
Analyze computer-generated threats for counter intelligence or criminal activity. |
1 |
T0424
|
Analyze and provide information to stakeholders that will support the development of security application or modification of an existing security application. |
1 |
T0425
|
Analyze organizational cyber policy. |
3 |
T0426
|
Analyze the results of software, hardware, or interoperability testing. |
1 |
T0427
|
Analyze user needs and requirements to plan architecture. |
2 |
T0428
|
Analyze security needs and software requirements to determine feasibility of design within time and cost constraints and security mandates. |
1 |
T0429
|
Assess policy needs and collaborate with stakeholders to develop policies to govern cyber activities. |
3 |
T0430
|
Gather and preserve evidence used on the prosecution of computer crimes. |
1 |
T0431
|
Check system hardware availability, functionality, integrity, and efficiency. |
1 |
T0432
|
Collect and analyze intrusion artifacts (e.g., source code, malware, and system configuration) and use discovered data to enable mitigation of potential cyber defense incidents within the enterprise. |
1 |
T0433
|
Conduct analysis of log files, evidence, and other information to determine best methods for identifying the perpetrator(s) of a network intrusion or other crimes. |
1 |
T0434
|
Conduct framing of pleadings to properly identify alleged violations of law, regulations, or policy/guidance. |
1 |
T0435
|
Conduct periodic system maintenance including cleaning (both physically and electronically), disk checks, routine reboots, data dumps, and testing. |
1 |
T0436
|
Conduct trial runs of programs and software applications to ensure that the desired information is produced and instructions and security levels are correct. |
2 |
T0437
|
Correlate training and learning to business or mission requirements. |
2 |
T0438
|
Create, edit, and manage network access control lists on specialized cyber defense systems (e.g., firewalls and intrusion prevention systems). |
1 |
T0439
|
Detect and analyze encrypted data, stenography, alternate data streams and other forms of concealed data. |
0 |
T0440
|
Capture and integrate essential system capabilities or business functions required for partial or full system restoration after a catastrophic failure event. |
1 |
T0441
|
Define and integrate current and future mission environments. |
2 |
T0442
|
Create training courses tailored to the audience and physical environment. |
1 |
T0443
|
Deliver training courses tailored to the audience and physical/virtual environments. |
1 |
T0444
|
Apply concepts, procedures, software, equipment, and/or technology applications to students. |
1 |
T0445
|
Design/integrate a cyber strategy that outlines the vision, mission, and goals that align with the organization’s strategic plan. |
3 |
T0446
|
Design, develop, integrate, and update system security measures that provide confidentiality, integrity, availability, authentication, and non-repudiation. |
1 |
T0447
|
Design hardware, operating systems, and software applications to adequately address requirements. |
1 |
T0448
|
Develop enterprise architecture or system components required to meet user needs. |
2 |
T0767
|
Perform content and/or metadata analysis to meet organization objectives. |
1 |
T0449
|
Design to security requirements to ensure requirements are met for all systems and/or applications. |
2 |
T0450
|
Design training curriculum and course content based on requirements. |
2 |
T0451
|
Participate in development of training curriculum and course content. |
2 |
T0452
|
Design, build, implement, and maintain a knowledge management framework that provides end-users access to the organization’s intellectual capital. |
1 |
T0453
|
Determine and develop leads and identify sources of information to identify and/or prosecute the responsible parties to an intrusion or other crimes. |
1 |
T0454
|
Define baseline security requirements in accordance with applicable guidelines. |
1 |
T0455
|
Develop software system testing and validation procedures, programming, and documentation. |
1 |
T0456
|
Develop secure software testing and validation procedures. |
1 |
T0457
|
Develop system testing and validation procedures, programming, and documentation. |
1 |
T0458
|
Comply with organization systems administration standard operating procedures. |
1 |
T0459
|
Implement data mining and data warehousing applications. |
1 |
T0460
|
Develop and implement data mining and data warehousing programs. |
1 |
T0461
|
Implement and enforce local network usage policies and procedures. |
1 |
T0462
|
Develop procedures and test fail-over for system operations transfer to an alternate site based on system availability requirements. |
1 |
T0463
|
Develop cost estimates for new or modified system(s). |
1 |
T0464
|
Develop detailed design documentation for component and interface specifications to support system design and development. |
1 |
T0465
|
Develop guidelines for implementation. |
1 |
T0466
|
Develop mitigation strategies to address cost, schedule, performance, and security risks. |
2 |
T0467
|
Ensure that training meets the goals and objectives for cybersecurity training, education, or awareness. |
1 |
T0468
|
Diagnose and resolve customer reported system incidents, problems, and events. |
1 |
T0469
|
Analyze and report organizational security posture trends. |
2 |
T0470
|
Analyze and report system security posture trends. |
2 |
T0471
|
Document original condition of digital and/or associated evidence (e.g., via digital photographs, written reports, hash function checking). |
1 |
T0472
|
Draft, staff, and publish cyber policy. |
2 |
T0473
|
Document and update as necessary all definition and architecture activities. |
2 |
T0474
|
Provide legal analysis and decisions to inspectors general, privacy officers, oversight and compliance personnel regarding compliance with cybersecurity policies and relevant legal and regulatory requirements. |
1 |
T0475
|
Assess adequate access controls based on principles of least privilege and need-to-know. |
2 |
T0476
|
Evaluate the impact of changes to laws, regulations, policies, standards, or procedures. |
1 |
T0477
|
Ensure the execution of disaster recovery and continuity of operations. |
1 |
T0478
|
Provide guidance on laws, regulations, policies, standards, or procedures to management, personnel, or clients. |
2 |
T0479
|
Employ information technology (IT) systems and digital storage media to solve, investigate, and/or prosecute cybercrimes and fraud committed against people and property. |
1 |
T0480
|
Identify components or elements, allocate comprehensive functional components to include security functions, and describe the relationships between the elements. |
1 |
T0481
|
Identify and address cyber workforce planning and management issues (e.g. recruitment, retention, and training). |
3 |
T0482
|
Make recommendations based on trend analysis for enhancements to software and hardware solutions to enhance customer experience. |
1 |
T0483
|
Identify potential conflicts with implementation of any cyber defense tools (e.g., tool and signature testing and optimization). |
1 |
T0484
|
Determine the protection needs (i.e., security controls) for the information system(s) and network(s) and document appropriately. |
1 |
T0485
|
Implement security measures to resolve vulnerabilities, mitigate risks, and recommend security changes to system or system components as needed. |
1 |
T0486
|
Implement Risk Management Framework (RMF)/Security Assessment and Authorization (SA&A) requirements for dedicated cyber defense systems within the enterprise, and document and maintain records for them. |
1 |
T0487
|
Facilitate implementation of new or revised laws, regulations, executive orders, policies, standards, or procedures. |
1 |
T0488
|
Implement designs for new or existing system(s). |
1 |
T0489
|
Implement system security measures in accordance with established procedures to ensure confidentiality, integrity, availability, authentication, and non-repudiation. |
1 |
T0490
|
Install and configure database management systems and software. |
1 |
T0491
|
Install and configure hardware, software, and peripheral equipment for system users in accordance with organizational standards. |
1 |
T0492
|
Ensure the integration and implementation of Cross-Domain Solutions (CDS) in a secure environment. |
1 |
T0493
|
Lead and oversee budget, staffing, and contracting. |
4 |
T0494
|
Administer accounts, network rights, and access to systems and equipment. |
1 |
T0495
|
Manage Accreditation Packages (e.g., ISO/IEC 15026-2). |
2 |
T0496
|
Perform asset management/inventory of information technology (IT) resources. |
1 |
T0497
|
Manage the information technology (IT) planning process to ensure that developed solutions meet customer requirements. |
1 |
T0498
|
Manage system/server resources including performance, capacity, availability, serviceability, and recoverability. |
1 |
T0499
|
Mitigate/correct security deficiencies identified during security/certification testing and/or recommend risk acceptance for the appropriate senior leader or authorized representative. |
1 |
T0500
|
Modify and maintain existing software to correct errors, to adapt it to new hardware, or to upgrade interfaces and improve performance. |
1 |
T0501
|
Monitor and maintain system/server configuration. |
1 |
T0502
|
Monitor and report client-level computer system performance. |
1 |
T0503
|
Monitor external data sources (e.g., cyber defense vendor sites, Computer Emergency Response Teams, Security Focus) to maintain currency of cyber defense threat condition and determine which security issues may have an impact on the enterprise. |
2 |
T0504
|
Assess and monitor cybersecurity related to system implementation and testing practices. |
2 |
T0505
|
Monitor the rigorous application of cyber policies, principles, and practices in the delivery of planning and management services. |
2 |
T0506
|
Seek consensus on proposed policy changes from stakeholders. |
2 |
T0507
|
Oversee installation, implementation, configuration, and support of system components. |
1 |
T0508
|
Verify minimum security requirements are in place for all applications. |
1 |
T0509
|
Perform an information security risk assessment. |
2 |
T0510
|
Coordinate incident response functions. |
1 |
T0511
|
Perform developmental testing on systems under development. |
1 |
T0512
|
Perform interoperability testing on systems exchanging electronic information with other systems. |
1 |
T0513
|
Perform operational testing. |
1 |
T0514
|
Diagnose faulty system/server hardware. |
1 |
T0515
|
Perform repairs on faulty system/server hardware. |
1 |
T0516
|
Perform secure program testing, review, and/or assessment to identify potential flaws in codes and mitigate vulnerabilities. |
1 |
T0517
|
Integrate results regarding the identification of gaps in security architecture. |
1 |
T0518
|
Perform security reviews and identify security gaps in architecture. |
2 |
T0519
|
Plan and coordinate the delivery of classroom techniques and formats (e.g., lectures, demonstrations, interactive exercises, multimedia presentations) for the most effective learning environment. |
1 |
T0520
|
Plan non-classroom educational techniques and formats (e.g., video courses, mentoring, web-based courses). |
1 |
T0521
|
Plan implementation strategy to ensure that enterprise components can be integrated and aligned. |
1 |
T0522
|
Prepare legal and other relevant documents (e.g., depositions, briefs, affidavits, declarations, appeals, pleadings, discovery). |
1 |
T0523
|
Prepare reports to document the investigation following legal standards and requirements. |
1 |
T0524
|
Promote knowledge sharing between information owners/users through an organization’s operational processes and systems. |
1 |
T0525
|
Provide enterprise cybersecurity and supply chain risk management guidance. |
1 |
T0526
|
Provides cybersecurity recommendations to leadership based on significant threats and vulnerabilities. |
2 |
T0527
|
Provide input to implementation plans and standard operating procedures as they relate to information systems security. |
1 |
T0528
|
Provide input to implementation plans, standard operating procedures, maintenance documentation, and maintenance training materials |
1 |
T0529
|
Provide policy guidance to cyber management, staff, and users. |
2 |
T0530
|
Develop a trend analysis and impact report. |
1 |
T0531
|
Troubleshoot hardware/software interface and interoperability problems. |
1 |
T0532
|
Review forensic images and other data sources (e.g., volatile data) for recovery of potentially relevant information. |
1 |
T0533
|
Review, conduct, or participate in audits of cyber programs and projects. |
2 |
T0534
|
Conduct periodic reviews/revisions of course content for accuracy, completeness alignment, and currency (e.g., course content documents, lesson plans, student texts, examinations, schedules of instruction, and course descriptions). |
1 |
T0535
|
Recommend revisions to curriculum and course content based on feedback from previous training sessions. |
1 |
T0536
|
Serve as an internal consultant and advisor in own area of expertise (e.g., technical, copyright, print media, electronic media). |
3 |
T0537
|
Support the CIO in the formulation of cyber-related policies. |
2 |
T0538
|
Provide support to test and evaluation activities. |
1 |
T0539
|
Test, evaluate, and verify hardware and/or software to determine compliance with defined specifications and requirements. |
1 |
T0540
|
Record and manage test data. |
1 |
T0541
|
Trace system requirements to design components and perform gap analysis. |
2 |
T0542
|
Translate proposed capabilities into technical requirements. |
2 |
T0543
|
WITHDRAWN: Use data carving techniques (e.g., FTK-Foremost) to extract data for further analysis. |
0 |
T0544
|
Verify stability, interoperability, portability, and/or scalability of system architecture. |
2 |
T0545
|
Work with stakeholders to resolve computer security incidents and vulnerability compliance. |
2 |
T0546
|
Write and publish cyber defense recommendations, reports, and white papers on incident findings to appropriate constituencies. |
1 |
T0547
|
Research and evaluate available technologies and standards to meet customer requirements. |
1 |
T0548
|
Provide advice and input for Disaster Recovery, Contingency, and Continuity of Operations Plans. |
2 |
T0606
|
Compile, integrate, and/or interpret all-source data for intelligence or vulnerability value with respect to specific targets. |
2 |
T0549
|
Perform technical (evaluation of technology) and nontechnical (evaluation of people and operations) risk and vulnerability assessments of relevant technology focus areas (e.g., local computing environment, network and infrastructure, enclave boundary, supporting infrastructure, and applications). |
1 |
T0550
|
Make recommendations regarding the selection of cost-effective security controls to mitigate risk (e.g., protection of information, systems and processes). |
1 |
T0551
|
Draft and publish supply chain security and risk management documents. |
4 |
T0552
|
Review and approve a supply chain security/risk management policy. |
1 |
T0001
|
Acquire and manage the necessary resources, including leadership support, financial resources, and key security personnel, to support information technology (IT) security goals and objectives and reduce overall organizational risk. |
3 |
T0002
|
Acquire necessary resources, including financial resources, to conduct an effective enterprise continuity of operations program. |
2 |
T0003
|
Advise senior management (e.g., Chief Information Officer [CIO]) on risk levels and security posture. |
3 |
T0004
|
Advise senior management (e.g., CIO) on cost/benefit analysis of information security programs, policies, processes, systems, and elements. |
5 |
T0005
|
Advise appropriate senior leadership or Authorizing Official of changes affecting the organization's cybersecurity posture. |
1 |
T0006
|
Advocate organization's official position in legal and legislative proceedings. |
2 |
T0007
|
Analyze and define data requirements and specifications. |
1 |
T0008
|
Analyze and plan for anticipated changes in data capacity requirements. |
2 |
T0009
|
Analyze information to determine, recommend, and plan the development of a new application or modification of an existing application. |
1 |
T0010
|
Analyze organization's cyber defense policies and configurations and evaluate compliance with regulations and organizational directives. |
1 |
T0011
|
Analyze user needs and software requirements to determine feasibility of design within time and cost constraints. |
1 |
T0012
|
Analyze design constraints, analyze trade-offs and detailed system and security design, and consider life cycle support. |
2 |
T0013
|
Apply coding and testing standards, apply security testing tools including "'fuzzing" static-analysis code scanning tools, and conduct code reviews. |
2 |
T0014
|
Apply secure code documentation. |
2 |
T0015
|
Apply security policies to applications that interface with one another, such as Business-to-Business (B2B) applications. |
2 |
T0016
|
Apply security policies to meet security objectives of the system. |
1 |
T0017
|
Apply service-oriented security architecture principles to meet organization's confidentiality, integrity, and availability requirements. |
1 |
T0018
|
Assess the effectiveness of cybersecurity measures utilized by system(s). |
1 |
T0019
|
Assess threats to and vulnerabilities of computer system(s) to develop a security risk profile. |
1 |
T0020
|
Develop content for cyber defense tools. |
1 |
T0021
|
Build, test, and modify product prototypes using working models or theoretical models. |
2 |
T0022
|
Capture security controls used during the requirements phase to integrate security within the process, to identify key security objectives, and to maximize software security while minimizing disruption to plans and schedules. |
2 |
T0023
|
Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources. |
1 |
T0024
|
Collect and maintain data needed to meet system cybersecurity reporting. |
1 |
T0025
|
Communicate the value of information technology (IT) security throughout all levels of the organization stakeholders. |
4 |
T0026
|
Compile and write documentation of program development and subsequent revisions, inserting comments in the coded instructions so others can understand the program. |
1 |
T0027
|
Conduct analysis of log files, evidence, and other information to determine best methods for identifying the perpetrator(s) of a network intrusion. |
1 |
T0028
|
Conduct and/or support authorized penetration testing on enterprise network assets. |
2 |
T0029
|
Conduct functional and connectivity testing to ensure continuing operability. |
2 |
T0030
|
Conduct interactive training exercises to create an effective learning environment. |
1 |
T0031
|
Conduct interviews of victims and witnesses and conduct interviews or interrogations of suspects. |
1 |
T0032
|
Conduct Privacy Impact Assessments (PIAs) of the application’s security design for the appropriate security controls, which protect the confidentiality and integrity of Personally Identifiable Information (PII). |
2 |
T0033
|
Conduct risk analysis, feasibility study, and/or trade-off analysis to develop, document, and refine functional requirements and specifications. |
1 |
T0034
|
Confer with systems analysts, engineers, programmers, and others to design application and to obtain information on project limitations and capabilities, performance requirements, and interfaces. |
1 |
T0035
|
Configure and optimize network hubs, routers, and switches (e.g., higher-level protocols, tunneling). |
1 |
T0036
|
Confirm what is known about an intrusion and discover new information, if possible, after identifying intrusion via dynamic analysis. |
1 |
T0037
|
Construct access paths to suites of information (e.g., link pages) to facilitate access by end-users. |
1 |
T0038
|
Develop threat model based on customer interviews and requirements. |
1 |
T0039
|
Consult with customers to evaluate functional requirements. |
1 |
T0040
|
Consult with engineering staff to evaluate interface between hardware and software. |
2 |
T0041
|
Coordinate and provide expert technical support to enterprise-wide cyber defense technicians to resolve cyber defense incidents. |
1 |
T0042
|
Coordinate with Cyber Defense Analysts to manage and administer the updating of rules and signatures (e.g., intrusion detection/protection systems, antivirus, and content blacklists) for specialized cyber defense applications. |
1 |
T0043
|
Coordinate with enterprise-wide cyber defense staff to validate network alerts. |
1 |
T0044
|
Collaborate with stakeholders to establish the enterprise continuity of operations program, strategy, and mission assurance. |
3 |
T0045
|
Coordinate with systems architects and developers, as needed, to provide oversight in the development of design solutions. |
1 |
T0046
|
Correct errors by making appropriate changes and rechecking the program to ensure that desired results are produced. |
1 |
T0047
|
Correlate incident data to identify specific vulnerabilities and make recommendations that enable expeditious remediation. |
1 |
T0048
|
Create a forensically sound duplicate of the evidence (i.e., forensic image) that ensures the original evidence is not unintentionally modified, to use for data recovery and analysis processes. This includes, but is not limited to, hard drives, floppy diskettes, CDs, PDAs, mobile phones, GPS, and all tape formats. |
1 |
T0049
|
Decrypt seized data using technical means. |
1 |
T0050
|
Define and prioritize essential system capabilities or business functions required for partial or full system restoration after a catastrophic failure event. |
1 |
T0051
|
Define appropriate levels of system availability based on critical system functions and ensure that system requirements identify appropriate disaster recovery and continuity of operations requirements to include any appropriate fail-over/alternate site requirements, backup requirements, and material supportability requirements for system recover/restoration. |
2 |
T0052
|
Define project scope and objectives based on customer requirements. |
1 |
T0053
|
Design and develop cybersecurity or cybersecurity-enabled products. |
2 |
T0054
|
Design group policies and access control lists to ensure compatibility with organizational standards, business rules, and needs. |
1 |
T0055
|
Design hardware, operating systems, and software applications to adequately address cybersecurity requirements. |
1 |
T0056
|
Design or integrate appropriate data backup capabilities into overall system designs, and ensure that appropriate technical and procedural processes exist for secure system backups and protected storage of backup data. |
2 |
T0057
|
Design, develop, and modify software systems, using scientific analysis and mathematical models to predict and measure outcome and consequences of design. |
1 |
T0058
|
Determine level of assurance of developed capabilities based on test results. |
1 |
T0059
|
Develop a plan to investigate alleged crime, violation, or suspicious activity utilizing computers and the Internet. |
2 |
T0060
|
Develop an understanding of the needs and requirements of information end-users. |
1 |
T0061
|
Develop and direct system testing and validation procedures and documentation. |
2 |
T0062
|
Develop and document requirements, capabilities, and constraints for design procedures and processes. |
1 |
T0063
|
Develop and document systems administration standard operating procedures. |
1 |
T0064
|
Review and validate data mining and data warehousing programs, processes, and requirements. |
1 |
T0065
|
Develop and implement network backup and recovery procedures. |
1 |
T0066
|
Develop and maintain strategic plans. |
3 |
T0067
|
Develop architectures or system components consistent with technical specifications. |
1 |
T0068
|
Develop data standards, policies, and procedures. |
1 |
T0069
|
Develop detailed security design documentation for component and interface specifications to support system design and development. |
1 |
T0070
|
Develop Disaster Recovery and Continuity of Operations plans for systems under development and ensure testing prior to systems entering a production environment. |
2 |
T0071
|
Develop/integrate cybersecurity designs for systems and networks with multilevel security requirements or requirements for the processing of multiple classification levels of data primarily applicable to government organizations (e.g., UNCLASSIFIED, SECRET, and TOP SECRET). |
1 |
T0072
|
Develop methods to monitor and measure risk, compliance, and assurance efforts. |
4 |
T0073
|
Develop new or identify existing awareness and training materials that are appropriate for intended audiences. |
1 |
T0074
|
Develop policy, programs, and guidelines for implementation. |
2 |
T0075
|
Provide technical summary of findings in accordance with established reporting procedures. |
1 |
T0076
|
Develop risk mitigation strategies to resolve vulnerabilities and recommend security changes to system or system components as needed. |
1 |
T0077
|
Develop secure code and error handling. |
1 |
T0078
|
Develop specific cybersecurity countermeasures and risk mitigation strategies for systems and/or applications. |
1 |
T0079
|
Develop specifications to ensure that risk, compliance, and assurance efforts conform with security, resilience, and dependability requirements at the software application, system, and network environment level. |
0 |
T0080
|
Develop test plans to address specifications and requirements. |
1 |
T0081
|
Diagnose network connectivity problem. |
1 |
T0082
|
Document and address organization's information security, cybersecurity architecture, and systems security engineering requirements throughout the acquisition life cycle. |
1 |
T0083
|
Draft statements of preliminary or residual security risks for system operation. |
0 |
T0084
|
Employ secure configuration management processes. |
2 |
T0085
|
Ensure all systems security operations and maintenance activities are properly documented and updated as necessary. |
1 |
T0660
|
Develop information requirements necessary for answering priority information requests. |
3 |
T0086
|
Ensure that the application of security patches for commercial products integrated into system design meet the timelines dictated by the management authority for the intended operational environment. |
1 |
T0087
|
Ensure that chain of custody is followed for all digital media acquired in accordance with the Federal Rules of Evidence. |
1 |
T0088
|
Ensure that cybersecurity-enabled products or other compensating security control technologies reduce identified risk to an acceptable level. |
2 |
T0089
|
Ensure that security improvement actions are evaluated, validated, and implemented as required. |
2 |
T0090
|
Ensure that acquired or developed system(s) and architecture(s) are consistent with organization's cybersecurity architecture guidelines. |
2 |
T0091
|
Ensure that cybersecurity inspections, tests, and reviews are coordinated for the network environment. |
1 |
T0092
|
Ensure that cybersecurity requirements are integrated into the continuity planning for that system and/or organization(s). |
1 |
T0093
|
Ensure that protection and detection capabilities are acquired or developed using the IS security engineering approach and are consistent with organization-level cybersecurity architecture. |
1 |
T0094
|
Establish and maintain communication channels with stakeholders. |
2 |
T0095
|
Establish overall enterprise information security architecture (EISA) with the organization’s overall security strategy. |
2 |
T0096
|
Establish relationships, if applicable, between the incident response team and other groups, both internal (e.g., legal department) and external (e.g., law enforcement agencies, vendors, public relations professionals). |
2 |
T0097
|
Evaluate and approve development efforts to ensure that baseline security safeguards are appropriately installed. |
1 |
T0098
|
Evaluate contracts to ensure compliance with funding, legal, and program requirements. |
2 |
T0099
|
Evaluate cost/benefit, economic, and risk analysis in decision-making process. |
4 |
T0100
|
Evaluate factors such as reporting formats required, cost constraints, and need for security restrictions to determine hardware configuration. |
2 |
T0101
|
Evaluate the effectiveness and comprehensiveness of existing training programs. |
1 |
T0102
|
Evaluate the effectiveness of laws, regulations, policies, standards, or procedures. |
1 |
T0103
|
Examine recovered data for information of relevance to the issue at hand. |
2 |
T0104
|
Fuse computer network attack analyses with criminal and counterintelligence investigations and operations. |
1 |
T0105
|
Identify components or elements, allocate security functions to those elements, and describe the relationships between the elements. |
1 |
T0106
|
Identify alternative information security strategies to address organizational security objective. |
1 |
T0107
|
Identify and direct the remediation of technical problems encountered during testing and implementation of new systems (e.g., identify and find work-arounds for communication protocols that are not interoperable). |
2 |
T0108
|
Identify and prioritize critical business functions in collaboration with organizational stakeholders. |
2 |
T0109
|
Identify and prioritize essential system functions or sub-systems required to support essential capabilities or business functions for restoration or recovery after a system failure or during a system recovery event based on overall system requirements for continuity and availability. |
2 |
T0110
|
Identify and/or determine whether a security incident is indicative of a violation of law that requires specific legal action. |
1 |
T0111
|
Identify basic common coding flaws at a high level. |
2 |
T0112
|
Identify data or intelligence of evidentiary value to support counterintelligence and criminal investigations. |
1 |
T0113
|
Identify digital evidence for examination and analysis in such a way as to avoid unintentional alteration. |
2 |
T0114
|
Identify elements of proof of the crime. |
1 |
T0115
|
Identify information technology (IT) security program implications of new technologies or technology upgrades. |
1 |
T0116
|
Identify organizational policy stakeholders. |
1 |
T0117
|
Identify security implications and apply methodologies within centralized and decentralized environments across the enterprise’s computer systems in software development. |
2 |
T0118
|
Identify security issues around steady state operation and management of software and incorporate security measures that must be taken when a product reaches its end of life. |
2 |
T0119
|
Identify, assess, and recommend cybersecurity or cybersecurity-enabled products for use within a system and ensure that recommended products are in compliance with organization's evaluation and validation requirements. |
2 |
T0120
|
Identify, collect, and seize documentary or physical evidence, to include digital media and logs associated with cyber intrusion incidents, investigations, and operations. |
1 |
T0121
|
Implement new system design procedures, test procedures, and quality standards. |
1 |
T0122
|
Implement security designs for new or existing system(s). |
1 |
T0123
|
Implement specific cybersecurity countermeasures for systems and/or applications. |
1 |
T0124
|
Incorporate cybersecurity vulnerability solutions into system designs (e.g., Cybersecurity Vulnerability Alerts). |
1 |
T0125
|
Install and maintain network infrastructure device operating system software (e.g., IOS, firmware). |
3 |
T0126
|
Install or replace network hubs, routers, and switches. |
1 |
T0127
|
Integrate and align information security and/or cybersecurity policies to ensure that system analysis meets security requirements. |
1 |
T0128
|
Integrate automated capabilities for updating or patching system software where practical and develop processes and procedures for manual updating and patching of system software based on current and projected patch timeline requirements for the operational environment of the system. |
1 |
T0130
|
Interface with external organizations (e.g., public affairs, law enforcement, Command or Component Inspector General) to ensure appropriate and accurate dissemination of incident and other Computer Network Defense information. |
2 |
T0131
|
Interpret and apply laws, regulations, policies, standards, or procedures to specific issues. |
2 |
T0132
|
Interpret and/or approve security requirements relative to the capabilities of new information technologies. |
1 |
T0133
|
Interpret patterns of noncompliance to determine their impact on levels of risk and/or overall effectiveness of the enterprise’s cybersecurity program. |
2 |
T0134
|
Lead and align information technology (IT) security priorities with the security strategy. |
2 |
T0135
|
Lead and oversee information security budget, staffing, and contracting. |
2 |
T0136
|
Maintain baseline system security according to organizational policies. |
1 |
T0137
|
Maintain database management systems software. |
1 |
T0138
|
Maintain deployable cyber defense audit toolkit (e.g., specialized cyber defense software and hardware) to support cyber defense audit missions. |
1 |
T0139
|
Maintain directory replication services that enable information to replicate automatically from rear servers to forward units via optimized routing. |
1 |
T0140
|
Maintain information exchanges through publish, subscribe, and alert functions that enable users to send and receive critical information as required. |
1 |
T0141
|
Maintain information systems assurance and accreditation materials. |
0 |
T0142
|
Maintain knowledge of applicable cyber defense policies, regulations, and compliance documents specifically related to cyber defense auditing. |
1 |
T0143
|
Make recommendations based on test results. |
1 |
T0144
|
Manage accounts, network rights, and access to systems and equipment. |
1 |
T0145
|
Manage and approve Accreditation Packages (e.g., ISO/IEC 15026-2). |
2 |
T0146
|
Manage the compilation, cataloging, caching, distribution, and retrieval of data. |
2 |
T0147
|
Manage the monitoring of information security data sources to maintain organizational situational awareness. |
1 |
T0148
|
Manage the publishing of Computer Network Defense guidance (e.g., TCNOs, Concept of Operations, Net Analyst Reports, NTSM, MTOs) for the enterprise constituency. |
2 |
T0149
|
Manage threat or target analysis of cyber defense information and production of threat information within the enterprise. |
1 |
T0150
|
Monitor and evaluate a system's compliance with information technology (IT) security, resilience, and dependability requirements. |
0 |
T0151
|
Monitor and evaluate the effectiveness of the enterprise's cybersecurity safeguards to ensure that they provide the intended level of protection. |
2 |
T0152
|
Monitor and maintain databases to ensure optimal performance. |
1 |
T0153
|
Monitor network capacity and performance. |
1 |
T0154
|
Monitor and report the usage of knowledge management assets and resources. |
1 |
T0155
|
Document and escalate incidents (including event’s history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment. |
1 |
T0156
|
Oversee and make recommendations regarding configuration management. |
1 |
T0157
|
Oversee the information security training and awareness program. |
1 |
T0158
|
Participate in an information security risk assessment during the Security Assessment and Authorization process. |
1 |
T0159
|
Participate in the development or modification of the computer environment cybersecurity program plans and requirements. |
1 |
T0160
|
Patch network vulnerabilities to ensure that information is safeguarded against outside parties. |
1 |
T0161
|
Perform analysis of log files from a variety of sources (e.g., individual host logs, network traffic logs, firewall logs, and intrusion detection system [IDS] logs) to identify possible threats to network security. |
1 |
T0162
|
Perform backup and recovery of databases to ensure data integrity. |
1 |
T0163
|
Perform cyber defense incident triage, to include determining scope, urgency, and potential impact, identifying the specific vulnerability, and making recommendations that enable expeditious remediation. |
1 |
T0164
|
Perform cyber defense trend analysis and reporting. |
2 |
T0165
|
Perform dynamic analysis to boot an “image” of a drive (without necessarily having the original drive) to see the intrusion as the user may have seen it, in a native environment. |
1 |
T0166
|
Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack. |
1 |
T0167
|
Perform file signature analysis. |
1 |
T0168
|
Perform hash comparison against established database. |
1 |
T0169
|
Perform cybersecurity testing of developed applications and/or systems. |
1 |
T0170
|
Perform initial, forensically sound collection of images and inspect to discern possible mitigation/remediation on enterprise systems. |
1 |
T0171
|
Perform integrated quality assurance testing for security functionality and resiliency attack. |
2 |
T0172
|
Perform real-time forensic analysis (e.g., using Helix in conjunction with LiveView). |
1 |
T0173
|
Perform timeline analysis. |
1 |
T0174
|
Perform needs analysis to determine opportunities for new and improved business process solutions. |
4 |
T0175
|
Perform real-time cyber defense incident handling (e.g., forensic collections, intrusion correlation and tracking, threat analysis, and direct system remediation) tasks to support deployable Incident Response Teams (IRTs). |
2 |
T0176
|
Perform secure programming and identify potential flaws in codes to mitigate vulnerabilities. |
1 |
T0177
|
Perform security reviews, identify gaps in security architecture, and develop a security risk management plan. |
3 |
T0178
|
Perform security reviews and identify security gaps in security architecture resulting in recommendations for inclusion in the risk mitigation strategy. |
2 |
T0179
|
Perform static media analysis. |
1 |
T0180
|
Perform system administration on specialized cyber defense applications and systems (e.g., antivirus, audit and remediation) or Virtual Private Network (VPN) devices, to include installation, configuration, maintenance, backup, and restoration. |
1 |
T0181
|
Perform risk analysis (e.g., threat, vulnerability, and probability of occurrence) whenever an application or system undergoes a major change. |
5 |
T0182
|
Perform tier 1, 2, and 3 malware analysis. |
1 |
T0183
|
Perform validation steps, comparing actual results with expected results and analyze the differences to identify impact and risks. |
0 |
T0184
|
Plan and conduct security authorization reviews and assurance case development for initial installation of systems and networks. |
1 |
T0185
|
Plan and manage the delivery of knowledge management projects. |
1 |
T0186
|
Plan, execute, and verify data redundancy and system recovery procedures. |
1 |
T0187
|
Plan and recommend modifications or adjustments based on exercise results or system environment. |
2 |
T0188
|
Prepare audit reports that identify technical and procedural findings, and provide recommended remediation strategies/solutions. |
2 |
T0189
|
Prepare detailed workflow charts and diagrams that describe input, output, and logical operation, and convert them into a series of instructions coded in a computer language. |
1 |
T0190
|
Prepare digital media for imaging by ensuring data integrity (e.g., write blockers in accordance with standard operating procedures). |
1 |
T0191
|
Prepare use cases to justify the need for specific information technology (IT) solutions. |
1 |
T0192
|
Prepare, distribute, and maintain plans, instructions, guidance, and standard operating procedures concerning the security of network system(s) operations. |
1 |
T0193
|
Process crime scenes. |
1 |
T0194
|
Properly document all systems security implementation, operations, and maintenance activities and update as necessary. |
1 |
T0195
|
Provide a managed flow of relevant information (via web-based portals or other means) based on mission requirements. |
1 |
T0196
|
Provide advice on project costs, design concepts, or design changes. |
4 |
T0197
|
Provide an accurate technical evaluation of the software application, system, or network, documenting the security posture, capabilities, and vulnerabilities against relevant cybersecurity compliances. |
0 |
T0198
|
Provide daily summary reports of network events and activity relevant to cyber defense practices. |
1 |
T0199
|
Provide enterprise cybersecurity and supply chain risk management guidance for development of the Continuity of Operations Plans. |
3 |
T0200
|
Provide feedback on network requirements, including network architecture and infrastructure. |
1 |
T0201
|
Provide guidelines for implementing developed systems to customers or installation teams. |
2 |
T0202
|
Provide cybersecurity guidance to leadership. |
1 |
T0203
|
Provide input on security requirements to be included in statements of work and other appropriate procurement documents. |
1 |
T0204
|
Provide input to implementation plans and standard operating procedures. |
1 |
T0205
|
Provide input to the Risk Management Framework process activities and related documentation (e.g., system life-cycle support plans, concept of operations, operational procedures, and maintenance training materials). |
6 |
T0206
|
Provide leadership and direction to information technology (IT) personnel by ensuring that cybersecurity awareness, basics, literacy, and training are provided to operations personnel commensurate with their responsibilities. |
1 |
T0207
|
Provide ongoing optimization and problem-solving support. |
4 |
T0208
|
Provide recommendations for possible improvements and upgrades. |
3 |
T0209
|
Provide recommendations on data structures and databases that ensure correct and quality production of reports/management information. |
1 |
T0210
|
Provide recommendations on new database technologies and architectures. |
2 |
T0211
|
Provide system-related input on cybersecurity requirements to be included in statements of work and other appropriate procurement documents. |
1 |
T0212
|
Provide technical assistance on digital evidence matters to appropriate personnel. |
1 |
T0213
|
Provide technical documents, incident reports, findings from computer examinations, summaries, and other situational awareness information to higher headquarters. |
1 |
T0214
|
Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts. |
2 |
T0215
|
Recognize a possible security violation and take appropriate action to report the incident, as required. |
2 |
T0216
|
Recognize and accurately report forensic artifacts indicative of a particular operating system. |
1 |
T0217
|
Address security implications in the software acceptance phase including completion criteria, risk acceptance and documentation, common criteria, and methods of independent testing. |
2 |
T0218
|
Recommend new or revised security, resilience, and dependability measures based on the results of reviews. |
0 |
T0219
|
Recommend resource allocations required to securely operate and maintain an organization’s cybersecurity requirements. |
1 |
T0220
|
Resolve conflicts in laws, regulations, policies, standards, or procedures. |
6 |
T0661
|
Develop measures of effectiveness and measures of performance. |
2 |
T0607
|
Identify and conduct analysis of target communications to identify information essential to support operations. |
1 |
T0221
|
Review authorization and assurance documents to confirm that the level of risk is within acceptable limits for each software application, system, and network. |
2 |
T0222
|
Review existing and proposed policies with stakeholders. |
2 |
T0223
|
Review or conduct audits of information technology (IT) programs and projects. |
5 |
T0224
|
Review training documentation (e.g., Course Content Documents [CCD], lesson plans, student texts, examinations, Schedules of Instruction [SOI], and course descriptions). |
1 |
T0225
|
Secure the electronic device or information source. |
1 |
T0226
|
Serve on agency and interagency policy boards. |
2 |
T0227
|
Recommend policy and coordinate review and approval. |
2 |
T0228
|
Store, retrieve, and manipulate data for analysis of system capabilities and requirements. |
4 |
T0229
|
Supervise or manage protective or corrective measures when a cybersecurity incident or vulnerability is discovered. |
4 |
T0230
|
Support the design and execution of exercise scenarios. |
2 |
T0231
|
Provide support to security/certification test and evaluation activities. |
1 |
T0232
|
Test and maintain network infrastructure including software and hardware devices. |
1 |
T0233
|
Track and document cyber defense incidents from initial detection through final resolution. |
1 |
T0234
|
Track audit findings and recommendations to ensure that appropriate mitigation actions are taken. |
1 |
T0235
|
Translate functional requirements into technical solutions. |
1 |
T0236
|
Translate security requirements into application design elements including documenting the elements of the software attack surfaces, conducting threat modeling, and defining any specific security criteria. |
2 |
T0237
|
Troubleshoot system hardware and software. |
1 |
T0238
|
Extract data using data carving techniques (e.g., Forensic Tool Kit [FTK], Foremost). |
1 |
T0239
|
Use federal and organization-specific published documents to manage operations of their computing environment system(s). |
1 |
T0240
|
Capture and analyze network traffic associated with malicious activities using network monitoring tools. |
1 |
T0241
|
Use specialized equipment and techniques to catalog, document, extract, collect, package, and preserve digital evidence. |
2 |
T0242
|
Utilize models and simulations to analyze or predict system performance under different operating conditions. |
2 |
T0243
|
Verify and update security documentation reflecting the application/system security design features. |
2 |
T0244
|
Verify that application software/network/system security postures are implemented as stated, document deviations, and recommend required actions to correct those deviations. |
1 |
T0245
|
Verify that the software application/network/system accreditation and assurance documentation is current. |
0 |
T0246
|
Write and publish cyber defense techniques, guidance, and reports on incident findings to appropriate constituencies. |
1 |
T0247
|
Write instructional materials (e.g., standard operating procedures, production manual) to provide detailed guidance to relevant portion of the workforce. |
2 |
T0248
|
Promote awareness of security issues among management and ensure sound security principles are reflected in the organization's vision and goals. |
3 |
T0249
|
Research current technology to understand capabilities of required system or network. |
2 |
T0250
|
Identify cyber capabilities strategies for custom hardware and software development based on mission requirements. |
1 |
T0251
|
Develop security compliance processes and/or audits for external services (e.g., cloud service providers, data centers). |
1 |
T0252
|
Conduct required reviews as appropriate within environment (e.g., Technical Surveillance, Countermeasure Reviews [TSCM], TEMPEST countermeasure reviews). |
1 |
T0253
|
Conduct cursory binary analysis. |
1 |
T0254
|
Oversee policy standards and implementation strategies to ensure procedures and guidelines comply with cybersecurity policies. |
2 |
T0255
|
Participate in Risk Governance process to provide security risks, mitigations, and input on other technical risk. |
2 |
T0256
|
Evaluate the effectiveness of procurement function in addressing information security requirements and supply chain risks through procurement activities and recommend improvements. |
5 |
T0257
|
Determine scope, infrastructure, resources, and data sample size to ensure system requirements are adequately demonstrated. |
1 |
T0258
|
Provide timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities. |
1 |
T0259
|
Use cyber defense tools for continual monitoring and analysis of system activity to identify malicious activity. |
1 |
T0260
|
Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information. |
1 |
T0261
|
Assist in identifying, prioritizing, and coordinating the protection of critical cyber defense infrastructure and key resources. |
1 |
T0262
|
Employ approved defense-in-depth principles and practices (e.g., defense-in-multiple places, layered defenses, security robustness). |
1 |
T0553
|
Apply cybersecurity functions (e.g., encryption, access control, and identity management) to reduce exploitation opportunities. |
2 |
T0554
|
Determine and document software patches or the extent of releases that would leave software vulnerable. |
2 |
T0555
|
Document how the implementation of a new system or new interface between systems impacts the current and target environment including but not limited to security posture. |
1 |
T0556
|
Assess and design security management functions as related to cyberspace. |
1 |
T0557
|
Integrate key management functions as related to cyberspace. |
1 |
T0608
|
Conduct analysis of physical and logical digital technologies (e.g., wireless, SCADA, telecom) to identify potential avenues of access. |
1 |
T0609
|
Conduct access enabling of wireless computer and digital networks. |
1 |
T0610
|
Conduct collection and processing of wireless computer and digital networks. |
1 |
T0611
|
Conduct end-of-operations assessments. |
1 |
T0612
|
Conduct exploitation of wireless computer and digital networks. |
1 |
T0613
|
Conduct formal and informal coordination of collection requirements in accordance with established guidelines and procedures. |
1 |
T0614
|
Conduct independent in-depth target and technical analysis including target-specific information (e.g., cultural, organizational, political) that results in access. |
1 |
T0615
|
Conduct in-depth research and analysis. |
3 |
T0616
|
Conduct network scouting and vulnerability analyses of systems within a network. |
1 |
T0617
|
Conduct nodal analysis. |
5 |
T0618
|
Conduct on-net activities to control and exfiltrate data from deployed technologies. |
1 |
T0619
|
Conduct on-net and off-net activities to control, and exfiltrate data from deployed, automated technologies. |
1 |
T0620
|
Conduct open source data collection via various online tools. |
1 |
T0621
|
Conduct quality control to determine validity and relevance of information gathered about networks. |
1 |
T0622
|
Develop, review and implement all levels of planning guidance in support of cyber operations. |
1 |
T0623
|
Conduct survey of computer and digital networks. |
1 |
T0624
|
Conduct target research and analysis. |
3 |
T0625
|
Consider efficiency and effectiveness of collection assets and resources if/when applied against priority information requirements. |
1 |
T0626
|
Construct collection plans and matrixes using established guidance and procedures. |
1 |
T0627
|
Contribute to crisis action planning for cyber operations. |
3 |
T0628
|
Contribute to the development of the organization's decision support tools if necessary. |
2 |
T0629
|
Contribute to the development, staffing, and coordination of cyber operations policies, performance standards, plans and approval packages with appropriate internal and/or external decision makers. |
1 |
T0630
|
Incorporate intelligence equities into the overall design of cyber operations plans. |
1 |
T0631
|
Coordinate resource allocation of collection assets against prioritized collection requirements with collection discipline leads. |
1 |
T0632
|
Coordinate inclusion of collection plan in appropriate documentation. |
1 |
T0633
|
Coordinate target vetting with appropriate partners. |
1 |
T0634
|
Re-task or re-direct collection assets and resources. |
1 |
T0635
|
Coordinate with intelligence and cyber defense partners to obtain relevant essential information. |
2 |
T0636
|
Coordinate with intelligence planners to ensure that collection managers receive information requirements. |
1 |
T0637
|
Coordinate with the intelligence planning team to assess capability to satisfy assigned intelligence tasks. |
1 |
T0638
|
Coordinate, produce, and track intelligence requirements. |
1 |
T0639
|
Coordinate, synchronize and draft applicable intelligence sections of cyber operations plans. |
1 |
T0640
|
Use intelligence estimates to counter potential target actions. |
2 |
T0641
|
Create comprehensive exploitation strategies that identify exploitable technical or operational vulnerabilities. |
1 |
T0642
|
Maintain awareness of internal and external cyber organization structures, strengths, and employments of staffing and technology. |
2 |
T0643
|
Deploy tools to a target and utilize them once deployed (e.g., backdoors, sniffers). |
1 |
T0644
|
Detect exploits against targeted networks and hosts and react accordingly. |
1 |
T0645
|
Determine course of action for addressing changes to objectives, guidance, and operational environment. |
1 |
T0646
|
Determine existing collection management webpage databases, libraries and storehouses. |
1 |
T0647
|
Determine how identified factors affect the tasking, collection, processing, exploitation and dissemination architecture's form and function. |
1 |
T0648
|
Determine indicators (e.g., measures of effectiveness) that are best suited to specific cyber operation objectives. |
2 |
T0649
|
Determine organizations and/or echelons with collection authority over all accessible collection assets. |
1 |
T0650
|
Determine what technologies are used by a given target. |
3 |
T0651
|
Develop a method for comparing collection reports to outstanding requirements to identify information gaps. |
2 |
T0652
|
Develop all-source intelligence targeting materials. |
1 |
T0653
|
Apply analytic techniques to gain more target information. |
1 |
T0654
|
Develop and maintain deliberate and/or crisis plans. |
1 |
T0655
|
Develop and review specific cyber operations guidance for integration into broader planning activities. |
1 |
T0656
|
Develop and review intelligence guidance for integration into supporting cyber operations planning and execution. |
1 |
T0657
|
Develop coordinating instructions by collection discipline for each phase of an operation. |
1 |
T0658
|
Develop cyber operations plans and guidance to ensure that execution and resource allocation decisions align with organization objectives. |
1 |
T0659
|
Develop detailed intelligence support to cyber operations requirements. |
1 |
T0663
|
Develop munitions effectiveness assessment or operational assessment materials. |
2 |
T0664
|
Develop new techniques for gaining and keeping access to target systems. |
1 |
T0665
|
Develop or participate in the development of standards for providing, requesting, and/or obtaining support from external partners to synchronize cyber operations. |
2 |
T0666
|
Develop or shape international cyber engagement strategies, policies, and activities to meet organization objectives. |
1 |
T0667
|
Develop potential courses of action. |
2 |
T0668
|
Develop procedures for providing feedback to collection managers, asset managers, and processing, exploitation and dissemination centers. |
1 |
T0669
|
Develop strategy and processes for partner planning, operations, and capability development. |
1 |
T0670
|
Develop, implement, and recommend changes to appropriate planning procedures and policies. |
3 |
T0671
|
Develop, maintain, and assess cyber cooperation security agreements with external partners. |
1 |
T0672
|
Devise, document, and validate cyber operation strategy and planning documents. |
1 |
T0673
|
Disseminate reports to inform decision makers on collection issues. |
1 |
T0674
|
Disseminate tasking messages and collection plans. |
1 |
T0675
|
Conduct and document an assessment of the collection results using established procedures. |
1 |
T0676
|
Draft cyber intelligence collection and production requirements. |
1 |
T0677
|
Edit or execute simple scripts (e.g., Perl, VBScript) on Windows and UNIX systems. |
1 |
T0678
|
Engage customers to understand customers’ intelligence needs and wants. |
2 |
T0679
|
Ensure operational planning efforts are effectively transitioned to current operations. |
1 |
T0680
|
Ensure that intelligence planning activities are integrated and synchronized with operational planning timelines. |
2 |
T0681
|
Establish alternative processing, exploitation and dissemination pathways to address identified issues or problems. |
1 |
T0682
|
Validate the link between collection requests and critical information requirements and priority intelligence requirements of leadership. |
1 |
T0683
|
Establish processing, exploitation and dissemination management activity using approved guidance and/or procedures. |
1 |
T0684
|
Estimate operational effects generated through cyber activities. |
2 |
T0685
|
Evaluate threat decision-making processes. |
3 |
T0686
|
Identify threat vulnerabilities. |
2 |
T0687
|
Identify threats to Blue Force vulnerabilities. |
2 |
T0688
|
Evaluate available capabilities against desired effects to recommend efficient solutions. |
1 |
T0689
|
Evaluate extent to which collected information and/or produced intelligence satisfy information requests. |
1 |
T0690
|
Evaluate intelligence estimates to support the planning cycle. |
2 |
T0691
|
Evaluate the conditions that affect employment of available cyber intelligence capabilities. |
1 |
T0692
|
Generate and evaluate the effectiveness of network analysis strategies. |
1 |
T0693
|
Evaluate extent to which collection operations are synchronized with operational requirements. |
1 |
T0694
|
Evaluate the effectiveness of collection operations against the collection plan. |
1 |
T0695
|
Examine intercept-related metadata and content with an understanding of targeting significance. |
1 |
T0696
|
Exploit network devices, security devices, and/or terminals or environments using various methods or tools. |
1 |
T0697
|
Facilitate access enabling by physical and/or wireless means. |
1 |
T0698
|
Facilitate continuously updated intelligence, surveillance, and visualization input to common operational picture managers. |
1 |
T0699
|
Facilitate interactions between internal and external partner decision makers to synchronize and integrate courses of action in support of objectives. |
2 |
T0700
|
Facilitate the sharing of “best practices” and “lessons learned” throughout the cyber operations community. |
1 |
T0701
|
Collaborate with developers, conveying target and technical knowledge in tool requirements submissions, to enhance tool development. |
1 |
T0702
|
Formulate collection strategies based on knowledge of available intelligence discipline capabilities and gathering methods that align multi-discipline collection capabilities and accesses with targets and their observables. |
1 |
T0703
|
Gather and analyze data (e.g., measures of effectiveness) to determine effectiveness, and provide reporting for follow-on activities. |
1 |
T0704
|
Incorporate cyber operations and communications security support plans into organization objectives. |
1 |
T0705
|
Incorporate intelligence and counterintelligence to support plan development. |
1 |
T0706
|
Gather information about networks through traditional and alternative techniques, (e.g., social network analysis, call-chaining, traffic analysis.) |
1 |
T0707
|
Generate requests for information. |
5 |
T0708
|
Identify threat tactics, and methodologies. |
2 |
T0709
|
Identify all available partner intelligence capabilities and limitations supporting cyber operations. |
1 |
T0710
|
Identify and evaluate threat critical capabilities, requirements, and vulnerabilities. |
3 |
T0711
|
Identify, draft, evaluate, and prioritize relevant intelligence or information requirements. |
1 |
T0712
|
Identify and manage security cooperation priorities with external partners. |
1 |
T0713
|
Identify and submit intelligence requirements for the purposes of designating priority information requirements. |
1 |
T0764
|
Provide subject matter expertise to planning efforts with internal and external cyber operations partners. |
2 |
T0714
|
Identify collaboration forums that can serve as mechanisms for coordinating processes, functions, and outputs with specified organizations and functional groups. |
2 |
T0715
|
Identify collection gaps and potential collection strategies against targets. |
2 |
T0716
|
Identify coordination requirements and procedures with designated collection authorities. |
1 |
T0717
|
Identify critical target elements. |
1 |
T0718
|
Identify intelligence gaps and shortfalls. |
3 |
T0719
|
Identify cyber intelligence gaps and shortfalls for cyber operational planning. |
2 |
T0720
|
Identify gaps in our understanding of target technology and developing innovative collection approaches. |
1 |
T0721
|
Identify issues or problems that can disrupt and/or degrade processing, exploitation and dissemination architecture effectiveness. |
1 |
T0722
|
Identify network components and their functionality to enable analysis and target development. |
1 |
T0723
|
Identify potential collection disciplines for application against priority information requirements. |
1 |
T0724
|
Identify potential points of strength and vulnerability within a network. |
1 |
T0725
|
Identify and mitigate risks to collection management ability to support the plan, operations and target cycle. |
2 |
T0726
|
Identify the need, scope, and timeframe for applicable intelligence environment preparation derived production. |
1 |
T0727
|
Identify, locate, and track targets via geospatial analysis techniques. |
1 |
T0728
|
Provide input to or develop courses of action based on threat factors. |
1 |
T0729
|
Inform external partners of the potential effects of new or revised policy and guidance on cyber operations partnering activities. |
1 |
T0730
|
Inform stakeholders (e.g., collection managers, asset managers, processing, exploitation and dissemination centers) of evaluation results using established procedures. |
1 |
T0731
|
Initiate requests to guide tasking and assist with collection management. |
1 |
T0732
|
Integrate cyber planning/targeting efforts with other organizations. |
2 |
T0733
|
Interpret environment preparations assessments to determine a course of action. |
2 |
T0734
|
Issue requests for information. |
4 |
T0735
|
Lead and coordinate intelligence support to operational planning. |
1 |
T0736
|
Lead or enable exploitation operations in support of organization objectives and target requirements. |
1 |
T0737
|
Link priority collection requirements to optimal assets and resources. |
1 |
T0738
|
Maintain awareness of advancements in hardware and software technologies (e.g., attend training or conferences, reading) and their potential implications. |
1 |
T0739
|
Maintain relationships with internal and external partners involved in cyber planning or related areas. |
3 |
T0740
|
Maintain situational awareness and functionality of organic operational infrastructure. |
1 |
T0741
|
Maintain situational awareness of cyber-related intelligence requirements and associated tasking. |
1 |
T0742
|
Maintain situational awareness of partner capabilities and activities. |
1 |
T0743
|
Maintain situational awareness to determine if changes to the operating environment require review of the plan. |
2 |
T0744
|
Maintain target lists (i.e., RTL, JTL, CTL, etc.). |
1 |
T0745
|
Make recommendations to guide collection in support of customer requirements. |
2 |
T0746
|
Modify collection requirements as necessary. |
1 |
T0747
|
Monitor and evaluate integrated cyber operations to identify opportunities to meet organization objectives. |
2 |
T0748
|
Monitor and report changes in threat dispositions, activities, tactics, capabilities, objectives, etc. as related to designated cyber operations warning problem sets. |
3 |
T0749
|
Monitor and report on validated threat activities. |
3 |
T0750
|
Monitor completion of reallocated collection efforts. |
1 |
T0751
|
Monitor open source websites for hostile content directed towards organizational or partner interests. |
2 |
T0752
|
Monitor operational environment and report on adversarial activities which fulfill leadership’s priority information requirements. |
3 |
T0753
|
Monitor operational status and effectiveness of the processing, exploitation and dissemination architecture. |
1 |
T0754
|
Monitor target networks to provide indications and warning of target communications changes or processing failures. |
1 |
T0755
|
Monitor the operational environment for potential factors and risks to the collection operation management process. |
1 |
T0756
|
Operate and maintain automated systems for gaining and maintaining access to target systems. |
1 |
T0757
|
Optimize mix of collection assets and resources to increase effectiveness and efficiency against essential information associated with priority intelligence requirements. |
1 |
T0758
|
Produce timely, fused, all-source cyber operations intelligence and/or indications and warnings intelligence products (e.g., threat assessments, briefings, intelligence studies, country studies). |
3 |
T0759
|
Contribute to the review and refinement of policy, to include assessments of the consequences of endorsing or not endorsing such policy. |
1 |
T0760
|
Provide subject matter expertise to planning teams, coordination groups, and task forces as necessary. |
2 |
T0761
|
Provide subject-matter expertise and support to planning/developmental forums and working groups as appropriate. |
4 |
T0762
|
WITHDRAWN: Provide subject matter expertise in course of action development. |
0 |
T0763
|
Conduct long-range, strategic planning efforts with internal and external partners in cyber activities. |
4 |
T0765
|
Provide subject matter expertise to development of exercises. |
1 |
T0766
|
Propose policy which governs interactions with external coordination groups. |
1 |
T0768
|
Conduct cyber activities to degrade/remove information resident in computers and computer networks. |
1 |
T0769
|
Perform targeting automation activities. |
1 |
T0770
|
Characterize websites. |
1 |
T0771
|
Provide subject matter expertise to website characterizations. |
1 |
T0772
|
Prepare for and provide subject matter expertise to exercises. |
3 |
T0773
|
Prioritize collection requirements for collection platforms based on platform capabilities. |
1 |
T0774
|
Process exfiltrated data for analysis and/or dissemination to customers. |
1 |
T0775
|
Produce network reconstructions. |
1 |
T0776
|
Produce target system analysis products. |
1 |
T0777
|
Profile network or system administrators and their activities. |
1 |
T0778
|
Profile targets and their activities. |
1 |
T0779
|
Provide advice/assistance to operations and intelligence decision makers with reassignment of collection assets and resources in response to dynamic operational situations. |
1 |
T0780
|
Provide advisory and advocacy support to promote collection planning as an integrated component of the strategic campaign plans and other adaptive plans. |
1 |
T0781
|
Provide aim point and reengagement recommendations. |
1 |
T0782
|
Provide analyses and support for effectiveness assessment. |
3 |
T0783
|
Provide current intelligence support to critical internal/external stakeholders as appropriate. |
3 |
T0784
|
Provide cyber focused guidance and advice on intelligence support plan inputs. |
2 |
T0785
|
Provide evaluation and feedback necessary for improving intelligence production, intelligence reporting, collection requirements, and operations. |
3 |
T0786
|
Provide information and assessments for the purposes of informing leadership and customers; developing and refining objectives; supporting operation planning and execution; and assessing the effects of operations. |
3 |
T0787
|
Provide input for the development and refinement of the cyber operations objectives, priorities, strategies, plans, and programs. |
2 |
T0788
|
Provide input and assist in post-action effectiveness assessments. |
2 |
T0789
|
Provide input and assist in the development of plans and guidance. |
2 |
T0790
|
Provide input for targeting effectiveness assessments for leadership acceptance. |
1 |
T0791
|
Provide input to the administrative and logistical elements of an operational support plan. |
1 |
T0792
|
Provide intelligence analysis and support to designated exercises, planning activities, and time sensitive operations. |
2 |
T0793
|
Provide effectiveness support to designated exercises, and/or time sensitive operations. |
1 |
T0794
|
Provide operations and reengagement recommendations. |
1 |
T0795
|
Provide planning support between internal and external partners. |
2 |
T0796
|
Provide real-time actionable geolocation information. |
1 |
T0797
|
Provide target recommendations which meet leadership objectives. |
4 |
T0798
|
Provide targeting products and targeting support as designated. |
1 |
T0799
|
Provide time sensitive targeting support. |
1 |
T0800
|
Provide timely notice of imminent or hostile intentions or activities which may impact organization objectives, resources, or capabilities. |
2 |
T0801
|
Recommend refinement, adaption, termination, and execution of operational plans as appropriate. |
2 |
T0802
|
Review appropriate information sources to determine validity and relevance of information gathered. |
2 |
T0803
|
Reconstruct networks in diagram or report format. |
1 |
T0804
|
Record information collection and/or environment preparation activities against targets during operations designed to achieve cyber effects. |
1 |
T0805
|
Report intelligence-derived significant network events and intrusions. |
2 |
T0806
|
Request discipline-specific processing, exploitation, and disseminate information collected using discipline's collection assets and resources in accordance with approved guidance and/or procedures. |
1 |
T0807
|
Research communications trends in emerging technologies (in computer and telephony networks, satellite, cable, and wireless) in both open and classified sources. |
1 |
T0808
|
Review and comprehend organizational leadership objectives and guidance for planning. |
1 |
T0809
|
Review capabilities of allocated collection assets. |
2 |
T0810
|
Review intelligence collection guidance for accuracy/applicability. |
2 |
T0811
|
Review list of prioritized collection requirements and essential information. |
2 |
T0812
|
Review and update overarching collection plan, as required. |
1 |
T0813
|
Review, approve, prioritize, and submit operational requirements for research, development, and/or acquisition of cyber capabilities. |
1 |
T0814
|
Revise collection matrix based on availability of optimal assets and resources. |
1 |
T0815
|
Sanitize and minimize information to protect sources and methods. |
1 |
T0816
|
Scope the cyber intelligence planning effort. |
1 |
T0817
|
Serve as a conduit of information from partner teams by identifying subject matter experts who can assist in the investigation of complex or unusual situations. |
1 |
T0818
|
Serve as a liaison with external partners. |
1 |
T0819
|
Solicit and manage to completion feedback from requestors on quality, timeliness, and effectiveness of collection against collection requirements. |
1 |
T0820
|
Specify changes to collection plan and/or operational environment that necessitate re-tasking or re-directing of collection assets and resources. |
1 |
T0821
|
Specify discipline-specific collections and/or taskings that must be executed in the near term. |
1 |
T0822
|
Submit information requests to collection requirement management section for processing as collection requests. |
1 |
T0823
|
Submit or respond to requests for deconfliction of cyber operations. |
2 |
T0824
|
Support identification and documentation of collateral effects. |
1 |
T0825
|
Synchronize cyber international engagement activities and associated resource requirements as appropriate. |
1 |
T0826
|
Synchronize cyber portions of security cooperation plans. |
1 |
T0827
|
Synchronize the integrated employment of all available organic and partner intelligence collection assets using available collaboration capabilities and techniques. |
1 |
T0828
|
Test and evaluate locally developed tools for operational use. |
1 |
T0829
|
Test internal developed tools and techniques against target tools. |
1 |
T0830
|
Track status of information requests, including those processed as collection requests and production requirements, using established procedures. |
1 |
T0831
|
Translate collection requests into applicable discipline-specific collection requirements. |
1 |
T0832
|
Use feedback results (e.g., lesson learned) to identify opportunities to improve collection management efficiency and effectiveness. |
1 |
T0833
|
Validate requests for information according to established criteria. |
1 |
T0834
|
Work closely with planners, intelligence analysts, and collection managers to ensure intelligence requirements and collection plans are accurate and up-to-date. |
3 |
T0835
|
Work closely with planners, analysts, and collection managers to identify intelligence gaps and ensure intelligence requirements are accurate and up-to-date. |
1 |
T0836
|
Document lessons learned that convey the results of events and/or exercises. |
3 |
T0837
|
Advise managers and operators on language and cultural issues that impact organization objectives. |
1 |
T0838
|
Analyze and process information using language and/or cultural expertise. |
1 |
T0839
|
Assess, document, and apply a target's motivation and/or frame of reference to facilitate analysis, targeting and collection opportunities. |
1 |
T0840
|
Collaborate across internal and/or external organizational lines to enhance collection, analysis and dissemination. |
1 |
T0841
|
Conduct all-source target research to include the use of open source materials in the target language. |
1 |
T0842
|
Conduct analysis of target communications to identify essential information in support of organization objectives. |
1 |
T0843
|
Perform quality review and provide feedback on transcribed or translated materials. |
1 |
T0844
|
Evaluate and interpret metadata to look for patterns, anomalies, or events, thereby optimizing targeting, analysis and processing. |
1 |
T0845
|
Identify cyber threat tactics and methodologies. |
1 |
T0846
|
Identify target communications within the global network. |
1 |
T0847
|
Maintain awareness of target communication tools, techniques, and the characteristics of target communication networks (e.g., capacity, functionality, paths, critical nodes) and their potential implications for targeting, collection, and analysis. |
1 |
T0848
|
Provide feedback to collection managers to enhance future collection and analysis. |
1 |
T0849
|
Perform foreign language and dialect identification in initial source data. |
1 |
T0850
|
Perform or support technical network analysis and mapping. |
1 |
T0851
|
Provide requirements and feedback to optimize the development of language processing tools. |
1 |
T0852
|
Perform social network analysis and document as appropriate. |
1 |
T0853
|
Scan, identify and prioritize target graphic (including machine-to-machine communications) and/or voice language material. |
1 |
T0854
|
Tip critical or time-sensitive information to appropriate customers. |
1 |
T0855
|
Transcribe target voice materials in the target language. |
1 |
T0856
|
Translate (e.g., verbatim, gist, and/or summaries) target graphic material. |
1 |
T0857
|
Translate (e.g., verbatim, gist, and/or summaries) target voice material. |
1 |
T0858
|
Identify foreign language terminology within computer programs (e.g., comments, variable names). |
1 |
T0859
|
Provide near-real time language analysis support (e.g., live operations). |
1 |
T0860
|
Identify cyber/technology-related terminology in the target language. |
1 |
T0861
|
Work with the general counsel, external affairs and businesses to ensure both existing and new services comply with privacy and data security obligations. |
1 |
T0862
|
Work with legal counsel and management, key departments and committees to ensure the organization has and maintains appropriate privacy and confidentiality consent, authorization forms and information notices and materials reflecting current organization and legal practices and requirements. |
1 |
T0863
|
Coordinate with the appropriate regulating bodies to ensure that programs, policies and procedures involving civil rights, civil liberties and privacy considerations are addressed in an integrated and comprehensive manner. |
1 |
T0864
|
Liaise with regulatory and accrediting bodies. |
1 |
T0865
|
Work with external affairs to develop relationships with regulators and other government officials responsible for privacy and data security issues. |
1 |
T0866
|
Maintain current knowledge of applicable federal and state privacy laws and accreditation standards, and monitor advancements in information privacy technologies to ensure organizational adaptation and compliance. |
1 |
T0867
|
Ensure all processing and/or databases are registered with the local privacy/data protection authorities where required. |
1 |
T0868
|
Work with business teams and senior management to ensure awareness of “best practices” on privacy and data security issues. |
1 |
T0869
|
Work with organization senior management to establish an organization-wide Privacy Oversight Committee |
1 |
T0870
|
Serve in a leadership role for Privacy Oversight Committee activities |
1 |
T0871
|
Collaborate on cyber privacy and security policies and procedures |
2 |
T0872
|
Collaborate with cybersecurity personnel on the security risk assessment process to address privacy compliance and risk mitigation |
2 |
T0873
|
Interface with Senior Management to develop strategic plans for the collection, use and sharing of information in a manner that maximizes its value while complying with applicable privacy regulations |
1 |
T0874
|
Provide strategic guidance to corporate officers regarding information resources and technology |
1 |
T0875
|
Assist the Security Officer with the development and implementation of an information infrastructure |
1 |
T0876
|
Coordinate with the Corporate Compliance Officer regarding procedures for documenting and reporting self-disclosures of any evidence of privacy violations. |
1 |
T0877
|
Work cooperatively with applicable organization units in overseeing consumer information access rights |
1 |
T0878
|
Serve as the information privacy liaison for users of technology systems |
1 |
T0879
|
Act as a liaison to the information systems department |
1 |
T0880
|
Develop privacy training materials and other communications to increase employee understanding of company privacy policies, data handling practices and procedures and legal obligations |
1 |
T0881
|
Oversee, direct, deliver or ensure delivery of initial privacy training and orientation to all employees, volunteers, contractors, alliances, business associates and other appropriate third parties |
1 |
T0882
|
Conduct on-going privacy training and awareness activities |
1 |
T0883
|
Work with external affairs to develop relationships with consumer organizations and other NGOs with an interest in privacy and data security issues—and to manage company participation in public events related to privacy and data security |
1 |
T0884
|
Work with organization administration, legal counsel and other related parties to represent the organization’s information privacy interests with external parties, including government bodies, which undertake to adopt or amend privacy legislation, regulation or standard. |
1 |
T0885
|
Report on a periodic basis regarding the status of the privacy program to the Board, CEO or other responsible individual or committee |
1 |
T0886
|
Work with External Affairs to respond to press and other inquiries regarding concern over consumer and employee data |
1 |
T0887
|
Provide leadership for the organization’s privacy program |
1 |
T0888
|
Direct and oversee privacy specialists and coordinate privacy and data security programs with senior executives globally to ensure consistency across the organization |
1 |
T0889
|
Ensure compliance with privacy practices and consistent application of sanctions for failure to comply with privacy policies for all individuals in the organization’s workforce, extended workforce and for all business associates in cooperation with Human Resources, the information security officer, administration and legal counsel as applicable |
1 |
T0890
|
Develop appropriate sanctions for failure to comply with the corporate privacy policies and procedures |
1 |
T0891
|
Resolve allegations of noncompliance with the corporate privacy policies or notice of information practices |
1 |
T0892
|
Develop and coordinate a risk management and compliance framework for privacy |
1 |
T0893
|
Undertake a comprehensive review of the company’s data and privacy projects and ensure that they are consistent with corporate privacy and data security goals and policies. |
1 |
T0894
|
Develop and manage enterprise-wide procedures to ensure the development of new products and services is consistent with company privacy policies and legal obligations |
1 |
T0895
|
Establish a process for receiving, documenting, tracking, investigating and acting on all complaints concerning the organization’s privacy policies and procedures |
1 |
T0896
|
Establish with management and operations a mechanism to track access to protected health information, within the purview of the organization and as required by law and to allow qualified individuals to review or receive a report on such activity |
1 |
T0897
|
Provide leadership in the planning, design and evaluation of privacy and security related projects |
1 |
T0898
|
Establish an internal privacy audit program |
1 |
T0899
|
Periodically revise the privacy program considering changes in laws, regulatory or company policy |
1 |
T0900
|
Provide development guidance and assist in the identification, implementation and maintenance of organization information privacy policies and procedures in coordination with organization management and administration and legal counsel |
1 |
T0901
|
Assure that the use of technologies maintains, and does not erode, privacy protections on use, collection and disclosure of personal information |
1 |
T0902
|
Monitor systems development and operations for security and privacy compliance |
1 |
T0903
|
Conduct privacy impact assessments of proposed rules on the privacy of personal information, including the type of personal information collected and the number of people affected |
1 |
T0904
|
Conduct periodic information privacy impact assessments and ongoing compliance monitoring activities in coordination with the organization’s other compliance and operational assessment functions |
1 |
T0905
|
Review all system-related information security plans to ensure alignment between security and privacy practices |
1 |
T0951
|
Develop, review, and approve a plan to assess the security controls in a system and the organization. |
0 |
T0906
|
Work with all organization personnel involved with any aspect of release of protected information to ensure coordination with the organization’s policies, procedures and legal requirements |
1 |
T0907
|
Account for and administer individual requests for release or disclosure of personal and/or protected information |
1 |
T0908
|
Develop and manage procedures for vetting and auditing vendors for compliance with the privacy and data security policies and legal requirements |
1 |
T0909
|
Participate in the implementation and ongoing compliance monitoring of all trading partner and business associate agreements, to ensure all privacy concerns, requirements and responsibilities are addressed |
1 |
T0910
|
Act as, or work with, counsel relating to business partner contracts |
1 |
T0911
|
Mitigate effects of a use or disclosure of personal information by employees or business partners |
1 |
T0912
|
Develop and apply corrective action procedures |
1 |
T0913
|
Administer action on all complaints concerning the organization’s privacy policies and procedures in coordination and collaboration with other similar functions and, when necessary, legal counsel |
1 |
T0914
|
Support the organization’s privacy compliance program, working closely with the Privacy Officer, Chief Information Security Officer, and other business leaders to ensure compliance with federal and state privacy laws and regulations |
1 |
T0915
|
Identify and correct potential company compliance gaps and/or areas of risk to ensure full compliance with privacy regulations |
1 |
T0916
|
Manage privacy incidents and breaches in conjunction with the Privacy Officer, Chief Information Security Officer, legal counsel and the business units |
1 |
T0917
|
Coordinate with the Chief Information Security Officer to ensure alignment between security and privacy practices |
1 |
T0918
|
Establish, implement and maintains organization-wide policies and procedures to comply with privacy regulations |
1 |
T0919
|
Ensure that the company maintains appropriate privacy and confidentiality notices, consent and authorization forms, and materials |
1 |
T0920
|
Develop and maintain appropriate communications and training to promote and educate all workforce members and members of the Board regarding privacy compliance issues and requirements, and the consequences of noncompliance |
0 |
T0921
|
Determine business partner requirements related to the organization’s privacy program. |
0 |
T0922
|
Establish and administer a process for receiving, documenting, tracking, investigating and taking corrective action as appropriate on complaints concerning the company’s privacy policies and procedures. |
0 |
T0923
|
Cooperate with the relevant regulatory agencies and other legal entities, and organization officers, in any compliance reviews or investigations. |
0 |
T0924
|
Perform ongoing privacy compliance monitoring activities. |
0 |
T0925
|
Monitor advancements in information privacy technologies to ensure organization adoption and compliance. |
0 |
T0926
|
Develop or assist with the development of privacy training materials and other communications to increase employee understanding of company privacy policies, data handling practices and procedures and legal obligations. |
2 |
T0927
|
Appoint and guide a team of IT security experts. |
1 |
T0928
|
Collaborate with key stakeholders to establish a cybersecurity risk management program. |
1 |
T0929
|
Identify and assign individuals to specific roles associated with the execution of the Risk Management Framework. |
0 |
T0930
|
Establish a risk management strategy for the organization that includes a determination of risk tolerance. |
1 |
T0931
|
Identify the missions, business functions, and mission/business processes the system will support. |
0 |
T0932
|
Identify stakeholders who have a security interest in the development, implementation, operation, or sustainment of a system. |
0 |
T0933
|
Identify stakeholders who have a security interest in the development, implementation, operation, or sustainment of a system. |
0 |
T0934
|
Identify stakeholder assets that require protection. |
0 |
T0935
|
Conduct an initial risk assessment of stakeholder assets and update the risk assessment on an ongoing basis. |
0 |
T0936
|
Define the stakeholder protection needs and stakeholder security requirements. |
0 |
T0937
|
Determine the placement of a system within the enterprise architecture. |
0 |
T0938
|
Identify organization-wide common controls that are available for inheritance by organizational systems. |
0 |
T0939
|
Conduct a second-level security categorization for organizational systems with the same impact level. |
0 |
T0940
|
Determine the boundary of a system. |
0 |
T0941
|
Identify the security requirements allocated to a system and to the organization. |
0 |
T0942
|
Identify the types of information to be processed, stored, or transmitted by a system. |
0 |
T0943
|
Categorize the system and document the security categorization results as part of system requirements. |
0 |
T0944
|
Describe the characteristics of a system. |
0 |
T0945
|
Register the system with appropriate organizational program/management offices. |
0 |
T0946
|
Select the security controls for a system and document the functional description of the planned control implementations in a security plan. |
0 |
T0947
|
Develop a strategy for monitoring security control effectiveness; coordinate the system-level strategy with the organization and mission/business process-level monitoring strategy. |
0 |
T0948
|
Review and approve security plans. |
0 |
T0949
|
Implement the security controls specified in a security plan or other system documentation. |
0 |
T0950
|
Document changes to planned security control implementation and establish the configuration baseline for a system. |
0 |
T0952
|
Assess the security controls in accordance with the assessment procedures defined in a security assessment plan. |
0 |
T0953
|
Prepare a security assessment report documenting the issues, findings, and recommendations from the security control assessment. |
0 |
T0954
|
Conduct initial remediation actions on security controls based on the findings and recommendations of a security assessment report; reassess remediated controls. |
0 |
T0955
|
Prepare a plan of action and milestones based on the findings and recommendations of a security assessment report excluding any remediation actions taken. |
0 |
T0956
|
Assemble an authorization package and submit the package to an authorizing official for adjudication. |
0 |
T0957
|
Determine the risk from the operation or use of a system or the provision or use of common controls. |
0 |
T0958
|
Identify and implement a preferred course of action in response to the risk determined. |
0 |
T0959
|
Determine if the risk from the operation or use of the system or the provision or use of common controls, is acceptable. |
0 |
T0960
|
Monitor changes to a system and its environment of operation. |
0 |
T0961
|
Assess the security controls employed within and inherited by the system in accordance with an organization-defined monitoring strategy. |
0 |
T0962
|
Respond to risk based on the results of ongoing monitoring activities, assessment of risk, and outstanding items in a plan of action and milestones. |
0 |
T0963
|
Update a security plan, security assessment report, and plan of action and milestones based on the results of a continuous monitoring process. |
0 |
T0964
|
Report the security status of a system (including the effectiveness of security controls) to an authorizing official on an ongoing basis in accordance with the monitoring strategy. |
0 |
T0965
|
Review the security status of a system (including the effectiveness of security controls) on an ongoing basis to determine whether the risk remains acceptable. |
0 |
T0966
|
Implement a system disposal strategy which executes required actions when a system is removed from service. |
0 |
T0967
|
Sponsor and promote continuous monitoring within the organization. |
0 |
T0968
|
Assign staff as needed to appropriate continuous monitoring working groups. |
0 |
T0969
|
Identify reporting requirements to support continuous monitoring activities. |
0 |
T0970
|
Establish scoring and grading metrics to measure effectiveness of continuous monitoring program. |
0 |
T0971
|
Determine how to integrate a continuous monitoring program into the organization’s broader information security governance structures and policies. |
0 |
T0972
|
Use continuous monitoring scoring and grading metrics to make information security investment decisions to address persistent issues. |
0 |
T0973
|
Ensure that the continuous monitoring staff have the training and resources (e.g., staff and budget) needed to perform assigned duties. |
0 |
T0974
|
Work with organizational risk analysts to ensure that continuous monitoring reporting covers appropriate levels of the organization. |
0 |
T0975
|
Work with the organizational risk analysts to ensure risk metrics are defining realistically to support continuous monitoring. |
0 |
T0976
|
Work with organizational officials to ensure continuous monitoring tool data provides situation awareness of risk levels. |
0 |
T0977
|
Establish triggers for unacceptable risk thresholds for continuous monitoring data. |
0 |
T0978
|
Work with organizational officials to establish system level reporting categories that can be used by the organization’s continuous monitoring program. |
0 |
T0980
|
Designate a qualified person to be responsible for the management and implementation of the continuous monitoring program. |
0 |
T0981
|
Identify the continuous monitoring stakeholders and establish a process to keep them informed about the program. |
0 |
T0982
|
Identify security oriented organization reporting requirements that are fulfilled by the continuous monitoring program. |
0 |
T0983
|
Use the continuous monitoring data to make information security investment decisions to address persistent issues. |
0 |
T0984
|
Define triggers within the continuous monitoring program that can be used to define unacceptable risk and result in action being taken to resolve. |
0 |
T0985
|
Establish scoring and grading metrics to measure effectiveness of continuous monitoring program. |
0 |
T0986
|
Work with security managers to establish appropriate continuous monitoring reporting requirements at the system level. |
0 |
T0987
|
Use the continuous monitoring tools and technologies to assess risk on an ongoing basis. |
0 |
T0988
|
Establish appropriate reporting requirements in adherence to the criteria identified in the continuous monitoring program for use in automated control assessment. |
0 |
T0989
|
Use non-automated assessment methods where the data from the continuous monitoring tools and technologies is not yet of adequate sufficiency or quality. |
0 |
T0990
|
Develop processes with the external audit group on how to share information regarding the continuous monitoring program and its impact on security control assessment. |
0 |
T0991
|
Identify reporting requirements for use in automated control assessment to support continuous monitoring. |
0 |
T0992
|
Determine how the continuous monitoring results will be used in ongoing authorization. |
0 |
T0993
|
Establish continuous monitoring tools and technologies access control process and procedures. |
0 |
T0994
|
Ensure that continuous monitoring tools and technologies access control is managed adequately. |
0 |
T0995
|
Establish a process to provide technical help to continuous monitoring mitigators. |
0 |
T0996
|
Coordinate continuous monitoring reporting requirements across various users. |
0 |
T0997
|
Establish responsibilities for supporting implementation of each continuous monitoring tool or technology. |
0 |
T0998
|
Establish liaison with scoring and metrics working group to support continuous monitoring. |
0 |
T0999
|
Establish and operate a process to manage introduction of new risk to support continuous monitoring. |
0 |
T1000
|
Establish continuous monitoring configuration settings issues and coordination sub-group. |
0 |
T1001
|
Establish continuous monitoring tools and technologies performance measurement/management requirements. |
0 |
T1002
|
Using scores and grades to motivate and assess performance while addressing concerns to support continuous monitoring |
0 |
T1003
|
Work with security managers (i.e., system owners, information system security managers, information system security officers, etc.) to establish appropriate reporting requirements for continuous monitoring at the system level. |
0 |
T1004
|
Use continuous monitoring tools to assess risk on an ongoing basis. |
0 |
T1005
|
Use the continuous monitoring data to make information security investment decisions to address persistent issues. |
0 |
T1006
|
Respond to issues flagged during continuous monitoring, escalate and coordinate a response. |
0 |
T1007
|
Review findings from the continuous monitoring program and mitigate risks on a timely basis. |
0 |